A survey on top security threats in cloud computing

Abstract

Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.

Authors and Affiliations

Muhammad Kazim, Shao Zhu

Keywords

Related Articles

MobisenseCar: A Mobile Crowd-Based Architecture for Data Acquisition and Processing in Vehicle-Based Sensing

The use of wireless technology via smartphone allows designing smartphone applications based on OBD-II for increasing environment sensing. However, uploading of vehicle’s diagnostics data via car driver’s tethered smart...

The Growing Role of Complex Sensor Systems and Algorithmic Pattern Recognition for Vascular Dementia Onset

Vascular Dementia is often Clinically diagnosed once the effects of the disease are prevalent in a person’s daily living routines. However previous research has shown various behavioral and physiological changes linked t...

Green Cloud Computing: Efficient Energy-Aware and Dynamic Resources Management in Data Centers

The uses of Cloud computing over the last years are constantly increasing since it has become a very important technology in the computing landscape. It provides to client decentralized services and a pay-as-you-go model...

A Framework to Automate Cloud based Service Attacks Detection and Prevention

With the increasing demand for high availability, scalability and cost minimization, the adaptation of cloud computing is also increasing. By the demand from the data, consumer or the customers of the applications, the s...

 Mobile Learning Environment System (MLES): The Case of Android-based Learning Application on Undergraduates’ Learning

  Of late, mobile technology has introduced new, novel environment that can be capitalized to further enrich the teaching and learning process in classrooms. Taking cognizance of this promising setting, a study was...

Download PDF file
  • EP ID EP142748
  • DOI 10.14569/IJACSA.2015.060316
  • Views 105
  • Downloads 0

How To Cite

Muhammad Kazim, Shao Zhu (2015). A survey on top security threats in cloud computing. International Journal of Advanced Computer Science & Applications, 6(3), 109-113. https://europub.co.uk/articles/-A-142748